Price-oriented, Rationing-free Protocol: Guideline for Designing Strategy/False-name Proof Auction Protocols

Size: px
Start display at page:

Download "Price-oriented, Rationing-free Protocol: Guideline for Designing Strategy/False-name Proof Auction Protocols"

Transcription

1 From: AAAI Technical Report WS Compilation copyright 2002, AAAI ( All rights reserved. Price-oriented, Rationing-free Protocol: Guideline for Designing Strategy/False-name Proof Auction Protocols Makoto Yokoo and Yuko Sakurai Kenji Terada NTT Corporation NTr Communication Science Laboratories 2-4 Hikaridai, Seika-cho Soraku-gun, Kyoto Japan {yokoo, NTT Corporation NTT Information Sharing Platform Laboratories Midori-cho Musashino, Tokyo , Japan http J/ yuko} Abstract We identify a distinctive class of combinatorial auction protocols called a Price-oriented, Rationing-free (PORF) protocol, which can be used as a guideline for developing strategy/false-name proof protocols. A PORF protocol is automatically guaranteed to be strategy-proof, i.e., for each agent, declaring its true evaluation values is an optimal strategy regardless of the declarations of other agents. Furthermore, if a PORF protocol satisfies additional conditions, the protocol is also guaranteed to be false-name-proof, that is, it eliminates the benefits from using false-name bids, i.e., bids submitted under multiple fictitious name such as multiple addresses. For Intemet auction protocols, being falsename-proof is important since identifying each participant on the Intemet is virtually impossible. The characteristics of a PORF protocol are as follows. For each agent, the price of each bundle of goods is presented. This price is determined based on the declared evaluation values of other agents, while it is independent of its own declaration. Then, each agent can choose the bundle that maximizes its utility independently of the allocations of other agents (i.e., mooning-free). We show that an existing false-name-proof protocol can be represented as a PORF protocol. Furthermore, we develop a new false-name-proof PORF protocol. Introduction Internet auctions have become an especially popular part of Electronic Commerce (EC). Among various studies related to Interact auctions, those on combinatorial auctions have lately attracted considerable attention (Fujishima, Leyton- Brown, & Shoham 1999; Klemperer 1999; Sandholm 1999; Lehmann, O Callaghan, & Shoham 1999). Although conventional auctions sell a single item at a time, combinatorial auctions sell multiple items with interdependent values simultaneously and allow the bidders to bid on any combination of items. In a combinatorial auction, a bidder can express complementary/substitutable preferences over multiple bids. By taking into account complementary/substitutable preferences, we can increase the participants utilities and the revenue of the seller. However, the possibility of a new type of cheating called false-name bids has been pointed out, i.e., an agent may try Copyright 2002, American Association for Artificial Intelligence ( All rights reserved. to profit from submitting false bids made under fictitious names, e.g., multiple addresses (Sakurai, Yokoo, & Matsubara 1999; Yokoo, Sakurai, & Matsubara 2001b). Such a dishonest action is very difficult to detect since identifying each participant on the Internet is virtually impossible. Compared with collusion (Klemperer 1999), a falsename bid is easier to execute since it can be done by someone acting alone. We can consider false-name bids a very restricted subset of general collusion. Yokoo et al. have been conducted a series of works on false-name bids. Their results can be summarized as follows. The generalized Vickrey auction protocol (GVA)(Varian 1995), which is strategy-proof, individually rational, and Pareto efficient, if there exists no false-name bid, is no longer strategy-proof when false-name bids are possible, i.e., the GVA is not false-name-proof (Sakurai, Yokoo, Matsubara 1999; Yokoo, Sakurai, & Matsubara 2000). There exists no false-name-proof combinatorial auction protocol that simultaneously satisfies Pareto efficiency and individual rationality (Sakurai, Yokoo, & Matsubara 1999; Yokoo, Sakurai, & Matsubara 2000). A false-name-proof combinatorial auction protocol called the LDS protocol (Yokoo, Sakurai, & Matsubara 2001b) and a false-name-proof multi-unit auction protocol called the IR protocol (Yokoo, Sakurai, & Matsubara 2001c) were developed. Developing a strategy/false-name proof protocol has been a difficult task. In this paper, we identify a distinctive class of combinatorial auction protocols called a Priceoriented, Rationing-free (PORF) protocol. The notion a PORF protocol can be used as a guideline for developing strategy/false-name protocols. More specifically, if a protocol can be represented as a PORF protocol, it is automatically guaranteed to be strategy-proof. Furthermore, if a PORF protocol satisfies additional conditions, it is also guaranteed to be false-name-proof. In a PORF protocol, for each agent, the price of each bundle of goods is presented. This price is determined based on the declared evaluation values of other agents, while it must be independent of its own declarations. Then, each agent can choose the bundle that maximizes its utility based 119

2 on the presented prices, independently of the allocations of other agents. A PORF protocol is different from a normal fixed-price mechanism, where fixed prices of goods/bundles are determined, and agents choose one or a set of bundles they are willing to buy, then the auctioneer tries to ration the allocation, e.g., to choose winners by using a lottery. In a PORF protocol, the auctioneer does not try to ration the allocation, i.e., if an agent is willing to buy a bundle, the agent is guaranteed to obtain the bundle regardless of the allocations of other agents. In a PORF protocol, the auctioneer must carefully determine the prices so that a feasible allocation, i.e., the allocation where the same good is not allocated to different agents, can be obtained without using a lottery. We show that various protocols, including the existing false-name-proof protocol called LDS protocol (Yokoo, Sakurai, & Matsubara 2001b) can be represented as a PORF protocol. Furthermore, we develop a new false-name-proof PORF protocol and compare it with the LDS protocol. Preliminaries Here, we introduce several basic terms and concepts. We concentrate on private value auctions (Mas-Colell, Whinston, & Green 1995). In private value auctions, each agent knows with certainty its own evaluation values of goods, which are independent of the other agents evaluation values. We define an agent s utility as the difference between this private value of the allocated bundle, i.e., a set of goods, and its payment. Such a utility is called a quasi-linear utility (Mas-Colell, Whinston, & Green 1995). These assumptions are commonly used for making theoretical analyses tractable. Formally, we assume that for each agent i, its type Oi is drawn from a set O. The utility of agent i, who obtains bundle B and an amount of money t~, is represented as v ( B, Oi ) + ti, where v ( B, Oi ) represents the private value of agent i for bundle B. In a traditional definition (Mas-Colell, Whinston, Green 1995), an auction protocol is (dominant-strategy) incentive compatible (or strategy-proof) if bidding the true private values of goods is a dominant strategy for each agent, i.e., an optimal strategy regardless of the actions of other agents. The revelation principle states that in the design of an auction protocol we can restrict our attention to incentive compatible protocols without loss of generality (Mas- Colell, Whinston, & Green 1995; Yokoo, Sakurai, & Matsubara 2000). In other words, if a certain property (e.g., Pareto efficiency) can be achieved using some auction protocol in a dominant-strategy equilibrium, i.e., a combination of dominant strategies of agents, the property can also be achieved using an incentive compatible auction protocol. In this paper, we extend the traditional definition of incentive compatibility so that it can address false-name bid manipulations, i.e., we define that an auction protocol is (dominant-strategy) incentive compatible if bidding the true private values of goods by using the true identifier is a dominant strategy for each agent. To distinguish the traditional and extended definition of incentive compatibility, we refer to the traditional definition as strategy-proof and to the extended definition as false-name-proof. We say an auction protocol is Pareto efficient when the sum of all participants utilities (including that of the auctioneer), i.e., the social surplus, is maximized in a dominantstrategy equilibrium. An auction protocol is individually rational if no participant suffers any loss in a dominantstrategy equilibrium, i.e., the payment never exceeds the evaluation value of the obtained goods. In a private value auction, individual rationality is indispensable; no agent wants to participate in an auction where it might be charged more money than it is willing to pay. Therefore, in this paper, we restrict our attention to individually rational protocols. Price-oriented, Rationing-free Protocol We show the overview of a PORF protocol. We assume there is a set of goods M = {1, 2,..., m}. For each bundle B C M, each agent declares its (not necessarily true) evaluation value. For each agent i, the price of each bundle B is calculated. This price can be a differentialprice, i.e., the price of the same bundle can vary for different agents. Also, the price for bundle B does not necessarily have to be additive, i.e., the sum of the prices of the goods in the bundle. The price can be super-additive (more than the sum) or sub-additive (less than the sum). The price for agent i is totally independent of its own declared evaluation values, while it is based on the declared evaluation values of the agents other than i. For agent i, a bundle that maximizes its utility is allocated under the given prices. If there exist multiple bundles that maximize i s utility, the auctioneer can coordinate the allocation and chooses a feasible allocation, i.e., the allocation where the same good is not allocated to different agents. Unless agent i is totally indifferent among multiple bundies, the auctioneer does not coordinate the allocation, i.e., the bundle allocated to agent i is determined independently of the allocations of the other agents. We call this property rationing-free. Formally, a PORF protocol can be described as follows. Each agent i declares its (not necessarily true) type/~i. assume an agent can declare multiple types using multiple identifiers. We assume a PORF protocol is an anonymous protocol, where permuting agents identifiers does not change the outcome. Let us represent a set of agents other than agent i as X and the set of declared types of X as Ox. The price of agent i for bundle B is represented as Pn(ex), i.e., the function of ex. For agent i who declares its type as 0i, the auctioneer chooses a bundle B*, where B* = axgmaxn v(b, 0i) PB(OX). Such a bundle might not be determined uniquely. Let us represent the set of such bundles as SB~.. The auctioneer determines an allocation, g = (B1, B2,...), where Bi SB* and fo r al l i 120

3 j, Bi O Bj = 13. If the prices are determined appropriately, we can guarantee that the auctioneer is able to choose such a feasible allocation. If there exists no false-name bid, i.e., an agent can use only one identifier, it is obvious that a PORF protocol is strategy-proof. For agent i, its price for a bundle is determined independently of its declared type. Also, the protocol is rationing-free, i.e., the bundle allocated to agent i is determined so that its utility is maximized, independently of the allocations of other agents. Therefore, over-declaring its evaluation value for bundle B, so that other agents prices for bundle B would increase and they would give up the idea of buying B, is totally useless. On the other hand, the auctioneer must set the prices appropriately so that he/she can choose a feasible allocation without rationing. We can see an interesting relationship between a PORF protocol and a traditional protocol, where a feasible allocation is determined first, and then the payment of each agent is determined based on the allocation. In a traditional protocol, it is obvious that the obtained allocation is feasible, but the auctioneer must determine the payment appropriately so that the protocol is strategy-proof. In a PORF protocol, it is obvious that the protocol is sta ategy-proof, but the auctioneer must determine prices appropriately so that he/she can choose a feasible allocation without rationing. Examples of PORF Protocols GVA In the Vickrey auction protocol for a single-item single-unit auction, the agent who declares the highest evaluation value obtains the good by paying the price that is equal to the second highest evaluation value. This protocol can be described as a PORF protocol as follows. For agent i, the price of the good is the highest evaluation value of agents other than i. It is clear that only one agent is willing to buy the good except for the case of random tie-breaking, where the utility of the winner is 0. In the generalized Vickrey auction protocol (GVA)(Var- ian 1995), which can be used for a combinatorial auction, the goods are allocated in a way that maximizes the obtained social surplus, i.e., the sum of all participants utilities including the auctioneer. To simplify the protocol description, we introduce the following notation. For a set of agents X and a set of goods S, we define V* (X, S) as the sum of the evaluation values of X when S is allocated optimally among X. To be precise, for a possible allocation g (/31,/3%...), where Uj~x Bj = S and for all x # y, B~ n/3v = O, V*(X, S) is defined as max 9 ~-~d~x v(/3j, Oj), where ~ is the declared type of agent j. The payment of agent i who obtains bundle/3 is represented as follows, where X is the set of agents other than i: V*(X, M) - V*(X, M \ The first term of this formula represents the optimal social surplus when agent i does not participate in the auction. The second term represents the optimal social surplus except agent i when agent i does participate and obtains bundle/3. In the GVA, we can assume each agent is required to pay the decreased amount of social surplus for other agents caused by its participation. The GVA can be represented as a PORF protocol, where PB(OX), i.e., the price of agent i for bundle B, is represented as follows. PB(OX) = V*(X, M) - V*(X, M It is straightforward to show that the auctioneer can choose a feasible allocation, which also maximizes the social surplus, in this PORF protocol. Bundle-size Ordered Protocol We describe a new PORF protocol that is false-name-proof. We call this protocol Bundle-size Ordered (BSO) protocol. Overview The overview of the BSO protocol is as follows. The auctioneer determines the reservation price rj for each good j, i.e., the auctioneer will not sell good j for less than rj. For simplicity, we assume that all goods have the same reservation price r. Relaxing this condition is rather straightforward. The price of agent i for bundle/3 is determined as follows. Let us assume k is the size of bundle B, i.e., the number of goods in/3. We assume the reservation price of bundle /3 isr x k. Let us assume/3~ represents the bundle that satisfies the following conditions. 1. There exists at least one common good between/3 and B I, i.e.,/3 O/3 ~ O. 2. For agent j i, whose declared type is 6, v(b, ~) r x k ~, where k is the size of B t, i.e., there exists an agent whose evaluation value for/3 is larger than (or equal to) the reservation price of/3~. 3. k ~ is largest within the bundles that satisfy the above two conditions. 4. v(/3, ~.) is largest within the bundles that satisfy the above three conditions. Now, the price of agent i for bundle/3 is defined as follows: when k ~ > k: oo, when k = k: v(b, ~), when k ~ < k: r x k. In short, when another agent is willing to pay more than the reservation price for bundle B ~, which is larger than/3 and conflicting with B, i.e., B and B have a common good, then agent i cannot buy/3. If the sizes are the same, the agent declaring the highest evaluation value can buy the bundle with the second highest evaluation value. If nobody is willing to pay more than the reservation price for a conflicting bundle with the same or larger size, then the agent can buy the bundle at the reservation price. Example 1 Let us assume there are three goods a, b, and c, and the reservation price for each is 100. There are two 121

4 agents, agent 1 and agent 2, whose types are 01,02, respectively. The evaluation value for a bundle v( B, Oi ) is determined as follows. (a) (b) (c) (a,b) (b,c) (a,c) O These evaluation values mean that agem 1 needs both a and b at the same time, while agent 2 needs either b or c but not both at the same time. In this case, the price of agent I for bundle (a, b), i.e., P(a,b)( { 02 } ), 200, i.e., the reservation price, the price of agent 2 for b, i.e., P(b) ( { 01} ), is oo due agent I s evaluation value for (a, b), and the price of agent2 for i.e., P(e)({01}), is 100, i.e,, the reservationprice. As a result, agent 1 obtains bundle (a, b) for 200 and agent 2 obtains c for 100. Example 2 The number of goods and reservation prices are identical to Example 1. There exist three agents whose types are as follows. (a) (b) (c) (a,b) (b,c) (a,c) Agent 1 needs both a and b at the same time and agent 2 needs both b and c at the same time, while agent 3 needs only a In this case, the price of agem l for bundle (a, b) 205 due to agent 2 s evaluation value for (b, c), the price agent 2for bundle (b, e) is 210 due to agent l s evaluation value for (a, b), and the price of agent 3for c is co due agent 2"s evaluation value for (b, c). As a result, agent obtains bundle (a, b) for 205, while c cannot be allocated. Allocation Feasibility Here, we show that the auctioneer can always choose a feasible allocation in the BSO protocol. More specifically, we show that for any bundle that contains good a, there exists at most one agent who is willing to buy such a bundle, except when multiple agents are willing to buy the bundle but the utilities of these agents are 0. If the utility of an agent is 0, the agent is indifferent between obtaining and not obtaining the bundle. Therefore, the auctioneer can coordinate and choose a feasible allocation. First, let us choose the bundle Bm~x that satisfies the following conditions. 1. B,,,,,x contains good a. 2. For agent i, whose type is 0i, v(braax, Oi) > r x kmax, where kma x is the size of Bma x. We assume each agent is declaring its true type since the protocol is strategy-proof. 3. k,n~, is largest within the bundles that satisfy the above two conditions. 4. v(bmaz, Oi) is largest within the bundles that satisfy the above three conditions. For agent j where j # i, the price of agent j for bundle B that contains a is determined as follows. Let us represent the size of B as k. If v(b, 0j) _> r x k, by this way of choosing Bmaz, kmaz >_ k holds. meve1111 abcd, j level 2 level 3 level 4 [ {(a,b,c)}, {(b,c,d)}, {(a,c,d)} [ {(a,b),(c,d)}, {(a,c),(b,d)}, {(a,d),(b,c)} [ {(a),(b),(c),(d)} Figure 1: Example of Leveled Division Sets when kr,,a~ > k: co, when kmax = k: v(brnax, Oi), when k,,,~ < k: r x k. When kmax > k, it is clear that nobody wants B at this price. When k,~x = k, since B,~ is chosen so that v(bm~, 0i) is maximized, the utility of agent j cannot be positive by obtaining B at this price, when k,,,,~ < k, the utility of agent j cannot be positive since v(b, Oj) < r x LDS Protocol In the LDS protocol, the auctioneer needs to define not only the reservation price, but also the method for dividing goods into bundles. This description is called a leveled division set. Figure 1 shows an example of a leveled division set where there are four goods (a, b, c, and d). Each level contains a set of divisions, where a division is a set of mutually exclusive bundles. The LDS protocol basically apply the GVA using divisions from level 1, level 2, and so on, until some agent can afford to buy a bundle by paying more than the reservation price. A leveled division set must be defined so that a union of multiple bundles in one division is always included in a division of an earlier level. For example, in level 4 of Figure 1, there is a division {(a),(b),(c),(d)}. We can see that all unions of multiple dies, e.g., {(a,b)}, {(a,b,c)}, appear in earlier levels. condition is required to make the protocol false-name-proof. Please consult (Yokoo, Sakurai, & Matsubara 2001b) for details of the LDS protocol. The LDS protocol can be described as a PORF protocol. The price of bundle B for agent i is defined as follows. Assume B is included in a division of level l. If B is not included in any division, the price is co. Also, let us assume l,mn represents the earliest level, where another agent wants to buy a bundle in level lm~n by paying more than the reservation price. when lmin < l: co, when lmin = l: the price for B is determined by the same method as the GVA, where possible allocations are restricted by the divisions of level l, when lmin > l: the reservation price. Due to space limitations, we omit a detailed explanation, but we can show that by using this protocol description, the obtained results are identical to that by the LDS protocol presented in (Yokoo, Sakurai, & Matsubara 2001b). False-name-proof PORF Protocol We show that a PORF protocol is false-name-proof if the protocol satisfies following two additional conditions. 122

5 monotonleprice increase: When the number of other agents increases, the price of an agent does not decrease. Formally, for any set of agent X, agent i who is not in X, and any bundle B, PB(Ox) <_ PB(OX U {01}) holds. no sulmr-additive price increase: For any mutually exclusive bundles B, B ~, any / set of agents X, and agents i, i who are not in X, PB(OX O {0 }) + P/3, (Ox 13 {0i}) PBtm,(Ox) holds. The first term in the left side represents the price of agent i for bundle 13, the second term in the left side represents the price of agent i I for ~, bundle B and the right side represents the price for bundle t3 u B for agent i (or i ) when agents other than i (or i ) are X. Here, we show that a PORF protocol that satisfies the above two conditions is false-name-proof. Assume agent i uses two identifiers i, i. If the agent obtains bundle/7 only with one identifier, say, i, then by the condition of monotonic price increase, the price of i for bundle/3 decreases or remains the same when agent i refrains from using another identifier ~. i On the other hand, if the agent obtains bundle t3 under identifier i and bundle B under identifier i, by the condition of no super-additive price increase, if the agent uses a single identifier, the price of B 13 B ~ becomesmaller than (or the same as) the sum of the prices for B and/3. When an agent uses three or more identifiers, by using a similar argument we can show that the agent s utility increases or at least remains the same when the agent uses only one identifier. Now, let us show that the BSO protocol satisfies these two conditions. It is obvious that the protocol satisfies the condition of monotonic price increase. For the condition of no super-additive price increase, it is clear that the condition is satisfied when PBt.tB ({~X) is the reservation price, since the price of a bundle is never less than the reservation price. On the other hand, if Pooo, (Ox) is not the reservation price, i.e., it is larger than the reservation price, then, there exists a bundle B ~ that has at least one common good with B 13 B I, where the size of B" is larger than or the same as B U/3 and the evaluation value for B ~ of one agent in X is larger than or equal to the reservation price. Therefore, either PB(Ox O {Ov}) or PB,(Ox 13 {Oi}) becomes oo, thus the condition of no super-additive price increase holds. On the other hand, the GVA fails to satisfy both conditions. Therefore, as shown in (Sakurai, Yokoo, & Matsubara 1999; Yokoo, Sakurai, & Matsubara 2001b), an agent can decrease its payment by using false-names and splitting its bid. Evaluations We compare the obtained social surplus of the BSO protocol and that of the LDS protocol using a simulation. For each agent i, we determine bundle/3 required by agent i and v(b, Oi) by the following method. t First, we determine k, which represents the size of bundle B, by using an exponential distribution de(k) = -pk (Fujishima, Leyton-Brown, & Shoham 1999). By using -= f I- -LDS I f -~ <o.1 : / I -k i., i, I. i i,, I, Reservation Price Figure 2: Comparison of Social Surplus this distribution, many small bundles are created. The provability that a size k bundle is created is e p times larger than that of a size k + 1 bundle. Next, we randomly choose k goods included in/3 and choose randomly v(b, 0~) from within the range of [(1 - q)k, (1 + q)k]. We assume that the evaluation values of an agent are all-or-nothing, i.e., the evaluation value for a bundle that does not include all of the goods in/3 is 0. In the LDS protocol, the auctioneer must determine a leveled division set. In this evaluation, we construct a leveled division set similar to that in Figure 1, i.e., at level 1, we put a division that contains a single bundle of m goods. Then, at level 2, we put m - I divisions, each of which contains a bundle of m - 1 goods, and so on. More specifically, we put divisions that contain size m bundles at level l. If possible, we combine multiple bundles in a single division, as shown in level 3 and level 4 in Figure 1. By using this method, we can put all small bundles in the leveled division set. Figure 2 shows the average ratio of the obtained social surplus to the Pareto efficient social surplus by varying the reservation price. In Figure 2, we set the number of goods m = 100, the number of agents n = 100, p = 1, and q Each data point represents the average of 100 problem instances. As shown in Figure 2, by setting the reservation price within the range of [0.75, 0.98], the obtained social surplus of the BSO protocol can reach 70% of the Pareto efficient social surplus. On the other hand, in the LDS protocol, the obtained social surplus becomes at most 11%. In this problem setting, most bundles consist of one or two goods, while there are a few bundles with size 7 or 8. When the reservation price is very small, both protocols sell a size m bundle to a single agent. By increasing the reservation price, the BSO protocol can allocate multiple bun- 123

6 1.2 -oo / ~0.9 ~0.7 I LDSl/ I / \_ 0.2~ 0" Reservation Price Figure 3: Comparison of Revenue dies with different sizes to different agents. On the other hand, in the LDS protocol, even when the reservation price increases, the goods are sold at the level where bundles contain 7 or 8 goods, thus the LDS protocol can allocate only a few bundles and the obtained social surplus cannot increase very much. Evaluations Figure 3 shows the average ratio of seller s revenue to the revenue obtained by using the GVA assuming there exists no false-name bids. Parameter settings are identical to Figure 2. We can see that trends are almost identical to that of the social surplus, with a notable exception that the ratio can be more than 1, i.e., the BSO protocol can obtain a better revenue that that of the GVA, when the reservation prices are set appropriately. Discussions Designing a protocol that is guaranteed to be strategy/falsename proof has been a difficult task. If the protocol can be represented as a PORF protocol, the protocol is automatically strategy-proof. Furthermore, if the protocol satisfies additional conditions, the protocol is guaranteed to be falsename-proof. Of course, we need to prove that a PORF protocol can obtain a feasible allocation. However, this tends to be much easier than proving a protocol is false-name-proof, since we can assume each agent declares its true type using a single identifier. As for the computational cost of executing a protocol, a naive implementation of a PORF protocol requires calculating prices for all bundles of all agents. When the number of goods/agents becomes large, this computational cost becomes prohibitively high. \ However, as in the case of the GVA, LDS, and BSO protocols, we can describe a protocol either as a PORF protocol or as the traditional manner in which an allocation of goods is determined, then the payments are calculated based on the allocation. We can assume that the description of a PORF protocol is not for an actual implementation but for a normative guideline for proving characteristics of a protocol. As far as the authors are aware, all known false-nameproof protocols, including the IR protocol (Yokoo, Sakurai, & Matsubara 2001c) for multi-trait auctions, can be described as a PORF protocol. An interesting open question is whether any false-name-proof protocol can be described as a PORF protocol that satisfies the above additional conditions. In comparing the LDS and BSO protocols, we can see that each protocol has its merits and demerits. In the previous section, we assume that the auctioneer does not have good knowledge of the possible evaluation values of agents. Therefore, the auctioneer must use a leveled division set that contains all possible small-sized bundles. On the other hand, when the auctioneer has good knowledge of the possible evaluation values of agents, the auctioneer can construct a more specialized leveled division set using the method described in (Yokoo, Sakurai, & Matsubara 2001a). In this case, the social surplus obtained by the LDS protocol becomes close to a Pareto efficient social surplus, which would be much better than that of the BSO protocol. While the LDS protocol is based on the GVA, the BSO protocol is similar to a greedy protocol for single-minded bidders described in (Lehmann, O Callaghan, & Shoham 1999). A single-minded bidder is an agent who is interested in only one particular bundle. In the BSO protocol, when determining the price of an agent, the protocol treats other agents as if they are a collection of single-minded bidders without considering the substitutable preferences of these agents. Conclusions In this paper, we introduced the concept of a Price-oriented, Rationing-free (PORF) protocol. We showed that if a protocol can be represented as a PORF protocol, the protocol is automatically guaranteed to be strategy-proof. Also, we showed that if the protocol satisfies additional conditions, the protocol is also guaranteed to be false-name-proof. We showed that existing protocols, such as the GVA and LDS, can be formalized as PORF protocols. Furthermore, we developed a new false-name-proof PORF protocol called the BSO protocol and compared it with the LDS protocol. We showed that the BSO protocol can obtain a better social surplus and better revenue than that of the LDS protocol when the auctioneer does not have a good model of possible evaluation values of agents. References Fujishima, Y.; Leyton-Brown, K.; and Shoham, Y Taming the computation complexity of combinatorial auctions: Optimal and approximate approaches. In Proceedings of the Sixteenth International Joint Conference on Artificial Intelligence (IJCAI-99),

7 Klempcrer, E Auction theory: A guide to the literature. Journal of Economics Surveys 13(3): Lehmann, D.; O Callaghan, L. I.; and Shoham, Y Truth revelation in approximately efficient combinatorial auction. In Proceedings of the First ACM Conference on Electronic Commerce (EC-99), Mas-Colell, A.; Whinston, M. D.; and Green, J. R Microeconomic Theory. Oxford University Press. Sakurai, Y.; Yokoo, M.; and Matsubara, S A limitation of the Generalized Vickrey Auction in Electronic Commerce: Robustness against false-name bids. In Proceedings of the Sixteenth National Conference on Artificial Intelligence (AAAI-99), Sandholm, T An algorithm for optimal winner determination in combinatorial auction. In Proceedings of the Sixteenth International Joint Conference on Artificial Intelligence (IJCAI-99), Varian, H. R Economic mechanism design for computerized agents. In Proceedings of the First Usenix Workshop on Electronic Commerce. Yokoo, M.; Sakurai, Y.; and Matsubara, S The effect of false-name declarations in mechanism design: Towards collective decision making on the Internet. In Proceedings of the Twentieth International Conference on Distributed Computing Systems ( ICDCS-2000), Yokoo, M.; Sakurai, Y.; and Matsubara, S. 2001a. Bundle design in robust combinatorial auction protocol against false-name bids. In Proceedings of l 7th International Joint Conference on Artificial Intelligence (1JCAI-2001), Yokoo, M.; Sakurai, Y.; and Matsubara, S. 2001b. Robust combinatorial auction protocol against false-name bids. Artificial Intelligence 130(2): Yokoo, M.; Sakurai, Y.; and Matsubara, S. 2001c. Robust multi-unit auction protocol against false-name bids. In Proceedings of 17th International Joint Conference on Artificial lntelligence ( IJCAI-2001),

Robust Multi-unit Auction Protocol against False-name Bids

Robust Multi-unit Auction Protocol against False-name Bids 17th International Joint Conference on Artificial Intelligence (IJCAI-2001) Robust Multi-unit Auction Protocol against False-name Bids Makoto Yokoo, Yuko Sakurai, and Shigeo Matsubara NTT Communication

More information

A Decision Method in B2B E-Commerce Model based on Multi-Items Auction

A Decision Method in B2B E-Commerce Model based on Multi-Items Auction [DOI: 10.2197/ipsjjip.20.649] Regular Paper A Decision Method in B2B E-Commerce Model based on Multi-Items Auction Satoshi Takahashi 1,a) Tokuro Matsuo 2,b) Received: September 15, 2011, Accepted: February,

More information

An Algorithm for Multi-Unit Combinatorial Auctions

An Algorithm for Multi-Unit Combinatorial Auctions From: AAAI-00 Proceedings Copyright 2000, AAAI (wwwaaaiorg) All rights reserved An Algorithm for Multi-Unit Combinatorial Auctions Kevin Leyton-Brown and Yoav Shoham and Moshe Tennenholtz Computer Science

More information

Concurrent Auctions Across The Supply Chain

Concurrent Auctions Across The Supply Chain Journal of Artificial Intelligence Research 21 (2004) 595-629 Submitted 7/03; published 5/04 Concurrent Auctions Across The Supply Chain Moshe Babaioff Noam Nisan School of Computer Science and Engineering,

More information

Incentive Compatible Mechanisms for Resource Procurement in Computational Grids with Rational Resource Providers

Incentive Compatible Mechanisms for Resource Procurement in Computational Grids with Rational Resource Providers Incentive Compatible Mechanisms for Resource Procurement in Computational Grids with Rational Resource Providers Hastagiri Prakash and Y. Narahari Electronic Commerce Laboratory Department of Computer

More information

Side constraints and non-price attributes in markets

Side constraints and non-price attributes in markets Games and Economic Behavior 55 (2006) 321 330 www.elsevier.com/locate/geb Note Side constraints and non-price attributes in markets Tuomas Sandholm a,, Subhash Suri b a Computer Science Department, Carnegie

More information

Reserve Price Auctions for Heterogeneous Spectrum Sharing

Reserve Price Auctions for Heterogeneous Spectrum Sharing Reserve Price Auctions for Heterogeneous Spectrum Sharing 1 Mehrdad Khaledi and Alhussein A. Abouzeid Department of Electrical, Computer and Systems Engineering Rensselaer Polytechnic Institute Troy, NY

More information

New Developments in Auction Theory & Practice. Jonathan Levin Cowles Lunch, March 2011

New Developments in Auction Theory & Practice. Jonathan Levin Cowles Lunch, March 2011 New Developments in Auction Theory & Practice Jonathan Levin Cowles Lunch, March 2011 Introduction Developments in auction theory and practice Rapid expansion in theory and practice of multi item auctions,

More information

Winner Determination in Combinatorial Auction Generalizations Λ

Winner Determination in Combinatorial Auction Generalizations Λ Winner Determination in Combinatorial Auction Generalizations Λ Tuomas Sandholm sandholm@cs.cmu.edu Computer Science Department Carnegie Mellon University Pittsburgh, PA 523 Subhash Suri Andrew Gilpin

More information

Multi-player and Multi-round Auctions with Severely Bounded Communication

Multi-player and Multi-round Auctions with Severely Bounded Communication Multi-player and Multi-round Auctions with Severely Bounded Communication Liad Blumrosen 1, Noam Nisan 1, and Ilya Segal 1 School of Engineering and Computer Science. The Hebrew University of Jerusalem,

More information

The Efficient Allocation of Individuals to Positions

The Efficient Allocation of Individuals to Positions The Efficient Allocation of Individuals to Positions by Aanund Hylland and Richard Zeckhauser Presented by Debreu Team: Justina Adamanti, Liz Malm, Yuqing Hu, Krish Ray Hylland and Zeckhauser consider

More information

Incentive-Compatible, Budget-Balanced, yet Highly Efficient Auctions for Supply Chain Formation

Incentive-Compatible, Budget-Balanced, yet Highly Efficient Auctions for Supply Chain Formation Incentive-Compatible, Budget-Balanced, yet Highly Efficient Auctions for Supply Chain Formation Moshe Babaioff School of Computer Science and Engineering, The Hebrew University of Jerusalem, Jerusalem

More information

An Evaluation of the Proposed Procurement Auction for the Purchase of Medicare Equipment: Experimental Tests of the Auction Architecture 1

An Evaluation of the Proposed Procurement Auction for the Purchase of Medicare Equipment: Experimental Tests of the Auction Architecture 1 An Evaluation of the Proposed Procurement Auction for the Purchase of Medicare Equipment: Experimental Tests of the Auction Architecture 1 Caroline Kim, Brian Merlob, Kathryn Peters, Charles R. Plott,

More information

Bidding for Sponsored Link Advertisements at Internet

Bidding for Sponsored Link Advertisements at Internet Bidding for Sponsored Link Advertisements at Internet Search Engines Benjamin Edelman Portions with Michael Ostrovsky and Michael Schwarz Industrial Organization Student Seminar September 2006 Project

More information

Multi-Dimensional Bid Improvement Algorithm for Simultaneous Auctions

Multi-Dimensional Bid Improvement Algorithm for Simultaneous Auctions Multi-Dimensional Bid Improvement Algorithm for Simultaneous Auctions Teddy Candale and Sandip Sen University of Tulsa, USA {tdi,sandip}@utulsa.edu Abstract Bidding for multi-items in simultaneous auctions

More information

Price of anarchy in auctions & the smoothness framework. Faidra Monachou Algorithmic Game Theory 2016 CoReLab, NTUA

Price of anarchy in auctions & the smoothness framework. Faidra Monachou Algorithmic Game Theory 2016 CoReLab, NTUA Price of anarchy in auctions & the smoothness framework Faidra Monachou Algorithmic Game Theory 2016 CoReLab, NTUA Introduction: The price of anarchy in auctions COMPLETE INFORMATION GAMES Example: Chicken

More information

Valuation Uncertainty and Imperfect Introspection in Second-Price Auctions

Valuation Uncertainty and Imperfect Introspection in Second-Price Auctions Valuation Uncertainty and Imperfect Introspection in Second-Price Auctions Abstract In auction theory, agents are typically presumed to have perfect knowledge of their valuations. In practice, though,

More information

Competitive Markets. Jeffrey Ely. January 13, This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 3.0 License.

Competitive Markets. Jeffrey Ely. January 13, This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 3.0 License. January 13, 2010 This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 3.0 License. Profit Maximizing Auctions Last time we saw that a profit maximizing seller will choose

More information

Bidding House: A Web Service and Ontology based Framework for Auctions

Bidding House: A Web Service and Ontology based Framework for Auctions Bidding House: A Web Service and Ontology based Framework for Auctions Dr. Saroj Kaushik, Himanshu Tagra, Computer Science and Engineering, Indian Institute of Technology, New Delhi, India E-mail: saroj@cse.iitd.ernet.in,

More information

Inefficiency of Equilibria in Task Allocation by Crowdsourcing

Inefficiency of Equilibria in Task Allocation by Crowdsourcing Inefficiency of Equilibria in Task Allocation by Crowdsourcing Shigeo Matsubara Department of Social Informatics, Kyoto University matsubara@i.kyotou.ac.jp Masanori Hatanaka Department of Social Informatics,

More information

Game theory (Sections )

Game theory (Sections ) Game theory (Sections 17.5-17.6) Game theory Game theory deals with systems of interacting agents where the outcome for an agent depends on the actions of all the other agents Applied in sociology, politics,

More information

1.3. Levels and Rates of Change Levels: example, wages and income versus Rates: example, inflation and growth Example: Box 1.3

1.3. Levels and Rates of Change Levels: example, wages and income versus Rates: example, inflation and growth Example: Box 1.3 1 Chapter 1 1.1. Scarcity, Choice, Opportunity Cost Definition of Economics: Resources versus Wants Wants: more and better unlimited Versus Needs: essential limited Versus Demand: ability to pay + want

More information

Competitive Analysis of Incentive Compatible On-line Auctions

Competitive Analysis of Incentive Compatible On-line Auctions Competitive Analysis of Incentive Compatible On-line Auctions Ron Lavi and Noam Nisan Theoretical Computer Science, 310 (2004) 159-180 Presented by Xi LI Apr 2006 COMP670O HKUST Outline The On-line Auction

More information

Resale and Bundling in Multi-Object Auctions

Resale and Bundling in Multi-Object Auctions Resale and Bundling in Multi-Object Auctions Marco Pagnozzi Università di Napoli Federico II and CSEF Allowing resale after an auction helps to achieve an e cient allocation Spectrum trading should be

More information

Note on webpage about sequential ascending auctions

Note on webpage about sequential ascending auctions Econ 805 Advanced Micro Theory I Dan Quint Fall 2007 Lecture 20 Nov 13 2007 Second problem set due next Tuesday SCHEDULING STUDENT PRESENTATIONS Note on webpage about sequential ascending auctions Everything

More information

Strategic Ignorance in the Second-Price Auction

Strategic Ignorance in the Second-Price Auction Strategic Ignorance in the Second-Price Auction David McAdams September 23, 20 Abstract Suppose bidders may publicly choose not to learn their values prior to a second-price auction with costly bidding.

More information

Incentive-Compatible Escrow Mechanisms

Incentive-Compatible Escrow Mechanisms Incentive-Compatible Escrow Mechanisms Jens Witkowski Department of Computer Sence Albert-Ludwigs-Universität Freiburg, Germany witkowsk@informatik.uni-freiburg.de Sven Seuken School of Eng. & Applied

More information

Carbon Footprint Optimization - Game Theoretic Problems and Solutions

Carbon Footprint Optimization - Game Theoretic Problems and Solutions Carbon Footprint Optimization - Game Theoretic Problems Solutions DEEPAK BAGCHI SHANTANU BISWAS Y. NARAHARI P. SURESH L. UDAYA LAKSHMI N. VISWANADHAM S. V. SUBRAHMANYA We introduce the carbon emission

More information

Optimal Auction Design for Agents with Hard Valuation Problems

Optimal Auction Design for Agents with Hard Valuation Problems Optimal Auction Design for Agents with Hard Valuation Problems The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters. Citation Published

More information

VALUE OF SHARING DATA

VALUE OF SHARING DATA VALUE OF SHARING DATA PATRICK HUMMEL* FEBRUARY 12, 2018 Abstract. This paper analyzes whether advertisers would be better off using data that would enable them to target users more accurately if the only

More information

Modeling of competition in revenue management Petr Fiala 1

Modeling of competition in revenue management Petr Fiala 1 Modeling of competition in revenue management Petr Fiala 1 Abstract. Revenue management (RM) is the art and science of predicting consumer behavior and optimizing price and product availability to maximize

More information

Econ 101, section 3, F06 Schroeter Exam #2, Red. Choose the single best answer for each question.

Econ 101, section 3, F06 Schroeter Exam #2, Red. Choose the single best answer for each question. Econ 101, section 3, F06 Schroeter Exam #2, Red Choose the single best answer for each question. 1. Which of the following is consistent with elastic demand? a. A 10% increase in price results in a 5%

More information

Perfectly competitive markets: Efficiency and distribution

Perfectly competitive markets: Efficiency and distribution Perfectly competitive markets: Efficiency and distribution By Fernando del Río Assistant Professor, University of Santiago de Compostela Introduction Free markets have been the main mechanism used to allocate

More information

Labour market recruiting with intermediaries

Labour market recruiting with intermediaries Labour market recruiting with intermediaries Paul Schweinzer Department of Economics, University of Bonn Lennéstraße 37, 53113 Bonn, Germany Paul.Schweinzer@uni-bonn.de October 26, 2007 Abstract We consider

More information

X Mechanism Design for Mixed Ads

X Mechanism Design for Mixed Ads X Mechanism Design for Mixed Ads Yoram Bachrach, Microsoft Research Sofia Ceppi, Microsoft Research Ian A. Kash, Microsoft Research Peter Key, Microsoft Research Mohammad Reza Khani, University of Maryland

More information

Welfare economics part 2 (producer surplus) Application of welfare economics: The Costs of Taxation & International Trade

Welfare economics part 2 (producer surplus) Application of welfare economics: The Costs of Taxation & International Trade Welfare economics part 2 (producer surplus) Application of welfare economics: The Costs of Taxation & International Trade Dr. Anna Kowalska-Pyzalska Department of Operations Research Presentation is based

More information

Umbrella Branding Can Leverage Reputation, but only with Market Power. May 19, Eric B. Rasmusen

Umbrella Branding Can Leverage Reputation, but only with Market Power. May 19, Eric B. Rasmusen Umbrella Branding Can Leverage Reputation, but only with Market Power May 19, 2012 Eric B. Rasmusen Dan R. and Catherine M. Dalton Professor, Department of Business Economics and Public Policy, Kelley

More information

Price competition in a differentiated products duopoly under network effects

Price competition in a differentiated products duopoly under network effects Price competition in a differentiated products duopoly under network effects Krina Griva Nikolaos Vettas February 005 Abstract We examine price competition under product-specific network effects, in a

More information

After studying this chapter you will be able to

After studying this chapter you will be able to 3 Demand and Supply After studying this chapter you will be able to Describe a competitive market and think about a price as an opportunity cost Explain the influences on demand Explain the influences

More information

Combinatorial auctions for electronic business

Combinatorial auctions for electronic business Sādhan ā Vol.30,Part2&3, April/June 2005, pp. 179 211. Printed in India Combinatorial auctions for electronic business Y NARAHARI 1 and PANKAJ DAYAMA 2 1 Electronic Enterprises Lab, Computer Science and

More information

Reserves Prices in Internet Advertising Auctions

Reserves Prices in Internet Advertising Auctions Reserves Prices in Internet Advertising Auctions Michael Ostrovsky and Michael Schwarz (2009) Chutima Tontarawongsa Department of Economics Duke University Market Design I: Auction Theory, Fall 2010 Chutima

More information

Sponsored Search Auction Design via Machine Learning

Sponsored Search Auction Design via Machine Learning Sponsored Search Auction Design via Machine Learning Maria-Florina Balcan Avrim Blum Jason D. Hartline Yishay Mansour ABSTRACT In this work we use techniques from the study of samplecomplexity in machine

More information

Efficiency and Robustness of Binary Online Feedback Mechanisms in Trading Environments with Moral Hazard

Efficiency and Robustness of Binary Online Feedback Mechanisms in Trading Environments with Moral Hazard Efficiency and Robustness of Binary Online Feedback Mechanisms in Trading Environments with Moral Hazard Chris Dellarocas MIT Sloan School of Management dell@mit.edu Introduction and Motivation Outline

More information

An auction mechanism for allocating the bandwidth of networks to their users q

An auction mechanism for allocating the bandwidth of networks to their users q Available online at www.sciencedirect.com Computer Networks 51 (2007) 4979 4996 www.elsevier.com/locate/comnet An auction mechanism for allocating the bandwidth of networks to their users q Manos Dramitinos

More information

WRITTEN PRELIMINARY Ph.D. EXAMINATION. Department of Applied Economics. University of Minnesota. June 16, 2014 MANAGERIAL, FINANCIAL, MARKETING

WRITTEN PRELIMINARY Ph.D. EXAMINATION. Department of Applied Economics. University of Minnesota. June 16, 2014 MANAGERIAL, FINANCIAL, MARKETING WRITTEN PRELIMINARY Ph.D. EXAMINATION Department of Applied Economics University of Minnesota June 16, 2014 MANAGERIAL, FINANCIAL, MARKETING AND PRODUCTION ECONOMICS FIELD Instructions: Write your code

More information

Optimizing the Revenue for Ad Exchanges in Header Bidding Advertising Markets

Optimizing the Revenue for Ad Exchanges in Header Bidding Advertising Markets 217 IEEE International Conference on Systems, Man, and Cybernetics (SMC) Banff Center, Banff, Canada, October 5-8, 217 Optimizing the Revenue for Ad Exchanges in Header Bidding Advertising Markets Rui

More information

Ph.D. MICROECONOMICS CORE EXAM August IMPORTANT. You are expected to adhere to the following guidelines in completing the exam:

Ph.D. MICROECONOMICS CORE EXAM August IMPORTANT. You are expected to adhere to the following guidelines in completing the exam: Ph.D. MICROECONOMICS CORE EXAM August 2009 This exam is designed to test your broad knowledge of microeconomics. There are three sections: one required and two choice sections. You must complete all three

More information

Exam #2 (100 Points Total)

Exam #2 (100 Points Total) Exam #2 (100 Points Total) Take the exam during an uninterrupted period of no more than 3 hours. (It should not take that long.) The space provided below each question should be sufficient for your answer,

More information

What about streaming data?

What about streaming data? What about streaming data? 1 The Stream Model Data enters at a rapid rate from one or more input ports Such data are called stream tuples The system cannot store the entire (infinite) stream Distribution

More information

Mechanism Design for Team Formation

Mechanism Design for Team Formation Mechanism Design for Team Formation Mason Wright Computer Science & Engineering University of Michigan Ann Arbor, MI masondw@umich.edu Yevgeniy Vorobeychik Electrical Engineering and Computer Science Vanderbilt

More information

FlexAuc: Serving Dynamic Demands in a Spectrum Trading Market with Flexible Auction

FlexAuc: Serving Dynamic Demands in a Spectrum Trading Market with Flexible Auction 1 FlexAuc: Serving Dynamic Demands in a Spectrum Trading Market with Flexible Auction Xiaoun Feng, Student Member, IEEE, Peng Lin, Qian Zhang, Fellow, IEEE, arxiv:144.2348v1 [cs.ni] 9 Apr 214 Abstract

More information

Basics of Economics. Alvin Lin. Principles of Microeconomics: August December 2016

Basics of Economics. Alvin Lin. Principles of Microeconomics: August December 2016 Basics of Economics Alvin Lin Principles of Microeconomics: August 2016 - December 2016 1 Markets and Efficiency How are goods allocated efficiently? How are goods allocated fairly? A normative statement

More information

Matching Demand with Supply in the Smart Grid using Agent-Based Multiunit Auction

Matching Demand with Supply in the Smart Grid using Agent-Based Multiunit Auction Matching Demand with Supply in the Smart Grid using Agent-Based Multiunit Auction Tri Kurniawan Wijaya École Polytechnique Fédérale de Lausanne Switzerland Email: tri-kurniawan.wijaya@epfl.ch Kate Larson

More information

compute Vickrey payments. The basic auction procedure is described for an exclusive-or bidding language over items. However, as described in Section 5

compute Vickrey payments. The basic auction procedure is described for an exclusive-or bidding language over items. However, as described in Section 5 Chapter 5 ibundle: An Iterative Combinatorial Auction In this chapter Iintroduce the ibundle ascending-price combinatorial auction, which follows quite directly from the primal-dual algorithm CombAuction

More information

Using Last-Minute Sales for Vertical Differentiation on the Internet

Using Last-Minute Sales for Vertical Differentiation on the Internet Abstract Number 011-0050 Using Last-Minute Sales for Vertical Differentiation on the Internet Ori Marom RSM Erasmus University Burgmeester Oudlaan 50 3062 PA Rotterdam, The Netherlands omarom@rsm.nl Abraham

More information

An Application of E-Commerce in Auction Process

An Application of E-Commerce in Auction Process An Application of E-Commerce in Auction Process MARIO SPUNDAK, VEDRAN BATOS, MARIO MILICEVIC Department of Electrical Engineering and Computing University of Dubrovnik Cira Carica 4, Dubrovnik 20000 CROATIA

More information

Exam #2 (100 Points Total) Answer Key

Exam #2 (100 Points Total) Answer Key Exam #2 (100 Points Total) Answer Key 1. A Pareto efficient outcome may not be good, but a Pareto inefficient outcome is in some meaningful sense bad. (a) (5 points) Give an example or otherwise explain,

More information

CHAPTER 8: SECTION 1 A Perfectly Competitive Market

CHAPTER 8: SECTION 1 A Perfectly Competitive Market CHAPTER 8: SECTION 1 A Perfectly Competitive Market Four Types of Markets A market structure is the setting in which a seller finds itself. Market structures are defined by their characteristics. Those

More information

Applied Welfare Economics

Applied Welfare Economics Economics Monika Köppl - Turyna Department of Economics ISCTE-IUL Summer 2014/2015 Introduction We will have lectures and problem solving sessions (usually one per two lectures) Attendance is generally

More information

computing in mechanism design

computing in mechanism design 994 computing in mechanism design Rubinstein, A. 1998. Modeling Bounded Rationality. Cambridge, MA: MIT Press. Sandholm, T. and Yokoo, M. 2003. The Second International Joint Conference on Autonomous Agents

More information

Predictive Planning for Supply Chain Management

Predictive Planning for Supply Chain Management Predictive Planning for Supply Chain Management David Pardoe and Peter Stone Department of Computer Sciences The University of Texas at Austin {dpardoe, pstone}@cs.utexas.edu Abstract Supply chains are

More information

Comparing Multiagent Systems Research in Combinatorial Auctions and Voting

Comparing Multiagent Systems Research in Combinatorial Auctions and Voting Comparing Multiagent Systems Research in Combinatorial Auctions and Voting Vincent Conitzer Department of Computer Science Duke University Durham, NC 27708, USA conitzer@cs.duke.edu Abstract In a combinatorial

More information

Using Last-Minute Sales for Vertical Differentiation on the Internet

Using Last-Minute Sales for Vertical Differentiation on the Internet Using Last-Minute Sales for Vertical Differentiation on the Internet Ori Marom RSM Erasmus University Rotterdam, The Netherlands omarom@rsmnl Abraham Seidmann University of Rochester Rochester, NY, USA

More information

Generative Models for Networks and Applications to E-Commerce

Generative Models for Networks and Applications to E-Commerce Generative Models for Networks and Applications to E-Commerce Patrick J. Wolfe (with David C. Parkes and R. Kang-Xing Jin) Division of Engineering and Applied Sciences Department of Statistics Harvard

More information

Auction Theory An Intrroduction into Mechanism Design. Dirk Bergemann

Auction Theory An Intrroduction into Mechanism Design. Dirk Bergemann Auction Theory An Intrroduction into Mechanism Design Dirk Bergemann Mechanism Design game theory: take the rules as given, analyze outcomes mechanism design: what kind of rules should be employed abstract

More information

Introduction Question Bank

Introduction Question Bank Introduction Question Bank 1. Science of wealth is the definition given by 2. Economics is the study of mankind of the ordinary business of life given by 3. Science which tells about what it is & what

More information

A monopoly market structure is one characterized by a single seller of a unique product with no close substitutes.

A monopoly market structure is one characterized by a single seller of a unique product with no close substitutes. These notes provided by Laura Lamb are intended to complement class lectures. The notes are based on chapter 12 of Microeconomics and Behaviour 2 nd Canadian Edition by Frank and Parker (2004). Chapter

More information

COMMON PROPERTY RESOURCES AND PUBLIC GOODS Microeconomics in Context (Goodwin, et al.), 3 rd Edition

COMMON PROPERTY RESOURCES AND PUBLIC GOODS Microeconomics in Context (Goodwin, et al.), 3 rd Edition Chapter 13 COMMON PROPERTY RESOURCES AND PUBLIC GOODS Microeconomics in Context (Goodwin, et al.), 3 rd Edition Overview and Objectives This chapter provides a classification of different types of goods

More information

ECON 115. Industrial Organization

ECON 115. Industrial Organization ECON 115 Industrial Organization 1. Tonight is a calculus review. 2. And a review of basic microeconomics. 3. We will do a couple of problems in class. First hour: Calculus Thinking on the margin. Introducing

More information

Friedrich von Hayek and mechanism design

Friedrich von Hayek and mechanism design Rev Austrian Econ (2015) 28:247 252 DOI 10.1007/s11138-015-0310-3 Friedrich von Hayek and mechanism design Eric S. Maskin 1,2 Published online: 12 April 2015 # Springer Science+Business Media New York

More information

5 Market Games For Teaching Economics

5 Market Games For Teaching Economics 5 Market Games For Teaching Economics Progression 5 Market Games from website economics-games.com To be played separately or as a sequence: Market Game 1: Sunk costs, monopoly, and introduction to the

More information

A Theory of Loss-Leaders: Making Money by Pricing Below Cost

A Theory of Loss-Leaders: Making Money by Pricing Below Cost A Theory of Loss-Leaders: Making Money by Pricing Below Cost Maria-Florina Balcan, Avrim Blum, T-H. Hubert Chan, and MohammadTaghi Hajiaghayi Computer Science Department, Carnegie Mellon University {ninamf,avrim,hubert,hajiagha}@cs.cmu.edu

More information

Optimizing Prices in Descending Clock Auctions

Optimizing Prices in Descending Clock Auctions Optimizing Prices in Descending Clock Auctions Abstract A descending (multi-item) clock auction (DCA) is a mechanism for buying from multiple parties. Bidder-specific prices decrease during the auction,

More information

An Efficient Protocol for Negotiation over Multiple Indivisible Resources

An Efficient Protocol for Negotiation over Multiple Indivisible Resources An Efficient Protocol for Negotiation over Multiple Indivisible Resources Sabyasachi Saha and Sandip Sen Department of Mathematical & Computer Sciences The University of Tulsa {sabyasachi-saha, sandip}@utulsa.edu

More information

Lecture 3: Incentive Compatibility, Revenue of the Vickrey auction, Sponsored Search

Lecture 3: Incentive Compatibility, Revenue of the Vickrey auction, Sponsored Search Lecture 3: Incentive Compatibility, Revenue of the Vickrey auction, Sponsored Search (Last lecture) Lemma: An auction satisfies incentive compatibility if and only if it is threshold based. We proved necessity

More information

1. True or False. If the marginal product of labor is decreasing, then the average product of labor must also be decreasing. Explain.

1. True or False. If the marginal product of labor is decreasing, then the average product of labor must also be decreasing. Explain. ECO 220 Intermediate Microeconomics Professor Mike Rizzo Second COLLECTED Problem Set SOLUTIONS This is an assignment that WILL be collected and graded. Please feel free to talk about the assignment with

More information

DYNAMIC RESOURCE PRICING ON FEDERATED CLOUDS

DYNAMIC RESOURCE PRICING ON FEDERATED CLOUDS DYNAMIC RESOURCE PRICING ON FEDERATED CLOUDS CCGRID 2010 The 10th IEEE/ACM Intl. Symp. on Cluster, Cloud and Grid Computing Marian Mihailescu Yong Meng Teo Department of Computer Science National University

More information

A Multi-Agent based Hyper-Heuristic Algorithm for the Winner Determination Problem

A Multi-Agent based Hyper-Heuristic Algorithm for the Winner Determination Problem Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 112 (2017) 117 126 International Conference on Knowledge Based and Intelligent Information and Engineering Systems, KES2017,

More information

The Relevance of a Choice of Auction Format in a Competitive Environment

The Relevance of a Choice of Auction Format in a Competitive Environment Review of Economic Studies (2006) 73, 961 981 0034-6527/06/00370961$02.00 The Relevance of a Choice of Auction Format in a Competitive Environment MATTHEW O. JACKSON California Institute of Technology

More information

Market-based Approaches to Optimization

Market-based Approaches to Optimization Market-based Approaches to Optimization Maria Karlsson, Fredrik Ygge, and Arne Andersson Uppsala University and Växjö University School of Mathematics and Systems Engineering Växjö University SE - 351

More information

Published online: 05 Jul 2013.

Published online: 05 Jul 2013. This article was downloaded by: [217.170.245.234] On: 27 June 2014, At: 04:58 Publisher: Taylor & Francis Informa Ltd Registered in England and Wales Registered Number: 1072954 Registered office: Mortimer

More information

Thursday, October 13: Short and Long Run Equilibria

Thursday, October 13: Short and Long Run Equilibria Amherst College epartment of Economics Economics 54 Fall 2005 Thursday, October 13: Short and Long Run Equilibria Equilibrium in the Short Run The equilibrium price and quantity are determined by the market

More information

Bilateral and Multilateral Exchanges for Peer-Assisted Content Distribution

Bilateral and Multilateral Exchanges for Peer-Assisted Content Distribution 1290 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 19, NO. 5, OCTOBER 2011 Bilateral and Multilateral Exchanges for Peer-Assisted Content Distribution Christina Aperjis, Ramesh Johari, Member, IEEE, and Michael

More information

Chapter 1 Introduction to Pricing Techniques

Chapter 1 Introduction to Pricing Techniques Chapter 1 Introduction to Pricing Techniques 1.1 Services, Booking Systems, and Consumer Value 2 1.1.1 Service definitions 1.1.2 Dynamic reservation systems 1.1.3 Consumer value 1.2 Overview of Pricing

More information

IB Economics Competitive Markets: Demand and Supply 1.4: Price Signals and Market Efficiency

IB Economics Competitive Markets: Demand and Supply 1.4: Price Signals and Market Efficiency IB Economics: www.ibdeconomics.com 1.4 PRICE SIGNALS AND MARKET EFFICIENCY: STUDENT LEARNING ACTIVITY Answer the questions that follow. 1. DEFINITIONS Define the following terms: [10 marks] Allocative

More information

CombineNet. November 15, CombineNet. Tomasz P. Michalak. Introduction. Introduction. Expressive Bidding. Expressive Bid Taking

CombineNet. November 15, CombineNet. Tomasz P. Michalak. Introduction. Introduction. Expressive Bidding. Expressive Bid Taking November 15, 2010 Presentation based on: Sholm, T. 2007. Commerce Its Application to Sourcing: How We Conducted $35 Billion of Generalized Combinatorial Auctions. AI Magazine, 28(3), 45-58, Fall - Sourcing

More information

On Optimal Tiered Structures for Network Service Bundles

On Optimal Tiered Structures for Network Service Bundles On Tiered Structures for Network Service Bundles Qian Lv, George N. Rouskas Department of Computer Science, North Carolina State University, Raleigh, NC 7695-86, USA Abstract Network operators offer a

More information

Limits of Software Reuse

Limits of Software Reuse Technical Note Issued: 07/2006 Limits of Software Reuse L. Holenderski Philips Research Eindhoven c Koninklijke Philips Electronics N.V. 2006 Authors address: L. Holenderski WDC3-044; leszek.holenderski@philips.com

More information

Post Doctoral Fellow, (Dec 2004 March 2006) INRIA Lorraine, France.

Post Doctoral Fellow, (Dec 2004 March 2006) INRIA Lorraine, France. Kameshwaran S Contact Information Centre for Global Logistics & Mfg. Strategies Phone: (91) 40-23187193 Indian School of Business Mobile: (91) 99851 24818 Hyderabad 500032 Fax: (91) 40-23007099 India e-mail:

More information

Silvia Rossi. Auctions. Lezione n. Corso di Laurea: Informatica. Insegnamento: Sistemi multi-agente. A.A.

Silvia Rossi. Auctions. Lezione n. Corso di Laurea: Informatica. Insegnamento: Sistemi multi-agente.   A.A. Silvia Rossi Auctions Lezione n. 16 Corso di Laurea: Informatica Insegnamento: Sistemi multi-agente Email: silrossi@unina.it A.A. 2014-2015 Reaching Agreements - Auctions (W: 7.2, 9.2.1 MAS: 11.1) 2 Any

More information

Chapter 2 E-Marketplaces: Structure, Mechanisms, Economics, and Impacts

Chapter 2 E-Marketplaces: Structure, Mechanisms, Economics, and Impacts Electronic Commerce 2006 Chapter 2 E-Marketplaces: Structure, Mechanisms, Economics, and Impacts True-False Questions 1. A central role of markets in an economy is to facilitate the exchange of information,

More information

7 The Optimum of Monopoly, Price Discrimination

7 The Optimum of Monopoly, Price Discrimination Microeconomics I - Lecture #7, March 31, 2009 7 The Optimum of Monopoly, Price Discrimination 7.1 Monopoly Up to now we have analyzed the behavior of a competitive industry, a market structure that is

More information

many autonomous individuals in human societies, it is perhaps natural to look to economic principles to design coordination mechanisms in computationa

many autonomous individuals in human societies, it is perhaps natural to look to economic principles to design coordination mechanisms in computationa Chapter 1 Introduction The Internet embodies a new paradigm of distributed open computer networks, in which agents users and computational devices are not cooperative, but self-interested, with private

More information

Chapter 2. E-Marketplaces: Structures, Mechanisms, Economics, and Impacts

Chapter 2. E-Marketplaces: Structures, Mechanisms, Economics, and Impacts Chapter 2 E-Marketplaces: Structures, Mechanisms, Economics, and Impacts E-Marketplaces Markets (electronic or otherwise) have three main functions: 1. Matching buyers and sellers; 2. Facilitating the

More information

Econ Microeconomic Analysis and Policy

Econ Microeconomic Analysis and Policy ECON 500 Microeconomic Theory Econ 500 - Microeconomic Analysis and Policy Monopoly Monopoly A monopoly is a single firm that serves an entire market and faces the market demand curve for its output. Unlike

More information

Auction Theory: an Introduction

Auction Theory: an Introduction Auction Theory: an Introduction Dongmo Zhang Intelligent Systems Lab University of Western Sydney Australia Thematic Trimester on Game Theory @ IRIT, France 6 July 2015 Objectives of the tutorial An auction

More information

Putting Auction Theory to Work: The Simultaneous Ascending Auction. Paul Milgrom

Putting Auction Theory to Work: The Simultaneous Ascending Auction. Paul Milgrom Putting Auction Theory to Work: The Simultaneous Ascending Auction Paul Milgrom Stanford University I review the uses of economic theory in the initial design and later improvement of the simultaneous

More information

INTERMEDIATE MICROECONOMICS LECTURE 13 - MONOPOLISTIC COMPETITION AND OLIGOPOLY. Monopolistic Competition

INTERMEDIATE MICROECONOMICS LECTURE 13 - MONOPOLISTIC COMPETITION AND OLIGOPOLY. Monopolistic Competition 13-1 INTERMEDIATE MICROECONOMICS LECTURE 13 - MONOPOLISTIC COMPETITION AND OLIGOPOLY Monopolistic Competition Pure monopoly and perfect competition are rare in the real world. Most real-world industries

More information

Empirical Approaches to Regulation Theory Philippe Gagnepain

Empirical Approaches to Regulation Theory Philippe Gagnepain Empirical Approaches to Regulation Theory Philippe Gagnepain Paris School of Economics-Université Paris 1 and CEPR 1 Introduction A regulator (public authority) delegates a task to a firm (monopoly). Telecommunications,

More information

Downloaded for free from 1

Downloaded for free from  1 Micro Chapter 6 -price ceiling or price cap: government regulation that makes it illegal to charge a price higher then a specified level -effects of the price cap on the market depend on whether the ceiling

More information